IndexConfidentialityIntegrityAvailabilityConfidentiality, Integrity, and Availability, also known as the CIA triad, is a model designed to guide information security policies within an organization. The model is also sometimes referred to as the AIC triad (availability, integrity and confidentiality) to avoid confusion with the Central Intelligence Agency. The elements of the triad are considered the three most crucial components of security. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay In this context, confidentiality is a set of rules that limits access to information, integrity is the guarantee that information is reliable and accurate, and availability is a guarantee of reliable access to information by people authorized. Confidentiality Confidentiality is more or less equivalent to privacy. The steps taken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people, while ensuring that the right people can actually obtain it: access must be limited to those authorized to view the data in question. It is also common for data to be classified based on the amount and type of damage that could be done if it fell into inadvertent hands. More or less rigorous measures can therefore be implemented based on these categories. Safeguarding the confidentiality of data may sometimes require specific training for those who are privy to such documents. Such training would typically include security risks that could threaten this information. Training can help familiarize authorized individuals with the risk factors and how to protect themselves from them. Additional aspects of training may include strong passwords and password best practices, and information on social engineering methods, to prevent them from bending data management rules with good intentions and potentially disastrous results. A good example of methods used to ensure confidentiality is an account number or routing number when banking online. Data encryption is a common method to ensure confidentiality. User ID and password are standard procedure; two-factor authentication is becoming the norm. Other options include biometric verification and security tokens, key fobs or soft tokens. Additionally, users can take precautions to minimize the number of places information appears and the number of times it is actually transmitted to complete a requested transaction. Additional measures may be taken in the case of extremely sensitive documents, precautions such as storage only on air-gapped computers, disconnected storage devices or, for highly confidential information, only in paper format. Integrity Integrity involves maintaining the consistency, accuracy and reliability of data documents throughout their entire life cycle. The data must not be modified during transport and measures must be taken to ensure that the data cannot be modified by unauthorized persons (for example, in breach of confidentiality). These measures include file permissions and user access controls. Version control can be used to prevent erroneous modifications or accidental deletions by authorized users from becoming a problem. Additionally, some means must be in place to detect any changes in the data that may occur as a result of non-human-caused events, such as an electromagnetic pulse (EMP) or a.
tags